Based on this image, which of the following statements are true? (Choose three.)
A. Attributes from two tables populate a table with the same name as a ServiceNow CMDB table.
B. This operation is more than likely a part of a step on a pattern set to Application Pattern Type.
C. If a value is unmatched, it is still merged into the Target Table.
D. For this operation to run, there must be some data in the process.executablePath variable.
E. This is a horizontal pattern of type "infrastructure."
Which of the following choices must be installed on a MID Server to run Credential-less Discovery?
A. Credential-less Extension
B. Nmap
C. Advanced IP Scanner
D. Defender
The CMDB contains which of the following record types? (Choose two.)
A. Model
B. Configuration Item (CI)
C. Asset
D. Relation Type
By default, which of the following are automatically available as variables for horizontal discovery patterns? (Choose two.)
A. infrastructure_system
B. The CI Type on the Discovery Pattern form
C. windows_cmdb_ci
D. computer_system
Which of the below choices are horizontal pattern types? (Choose two.)
A. Hardware
B. Software
C. Infrastructure
D. Application
Which choice best describes how to use a Behavior for discovery?
A. The MID Server selection method on a Discovery Schedule.
B. The Behavior drop-down menu on a Discovery IP Range.
C. The Behavior drop-down menu on a Discovery Status.
D. The Behavior checkbox on a CI.
What entry point type must a horizontal pattern have to execute from a process classifier?
A. A subnet entry point type.
B. HTTP(S) entry point type if the pattern is running on a web server application.
C. TCP entry point type or ALL entry point type.
D. It does not matter, it is triggered for all entry point types.
For the Set Parameter Value operation, which of the following is used in the syntax to declare a constant, unchanging Value?
A. Hash tag
B. Brackets
C. Quotes
D. Dollar sign
In general, Discovery can provide which of the following kinds of application relationships? (Choose two.)
A. tcp to udp
B. application to application
C. mid server to target
D. host to application
Which choice best describes a Functionality Definition?
A. Defines what CI identifiers to use.
B. Defines the IP addresses to discover.
C. Defines what Behavior to use from a Discovery Schedule.
D. Defines what protocols to detect from within a Behavior.